Botnets Continue to Target Aging D-Link Vulnerabilities
Dec. 31, 2024, 4:58 p.m.
Description
Two botnets, FICORA and CAPSAICIN, have been exploiting long-standing vulnerabilities in D-Link routers to spread globally. FICORA, a Mirai variant, uses a shell script to download and execute malware on various Linux architectures, incorporating DDoS attack functions. CAPSAICIN, likely based on the Keksec group's botnets, also targets multiple Linux architectures and includes DDoS capabilities. Both botnets exploit weaknesses in the HNAP interface of affected D-Link devices, demonstrating the persistent threat posed by unpatched vulnerabilities. The attackers use servers in the Netherlands and target countries worldwide, with CAPSAICIN focusing on East Asian countries. Regular device updates and comprehensive monitoring are crucial for mitigating these threats.
Tags
Date
- Created: Dec. 31, 2024, 4:26 p.m.
- Published: Dec. 31, 2024, 4:26 p.m.
- Modified: Dec. 31, 2024, 4:58 p.m.
Indicators
- faeea9d5091384195e87caae9dd88010c9a2b3b2c88ae9cac8d79fd94f250e9f
- f71dc58cc969e79cb0fdfe5163fbb9ed4fee5e13cc9407a11d231601ee4c6e23
- ec87dc841af77ec2987f3e8ae316143218e9557e281ca13fb954536aa9f9caf1
- ec508df7cb142a639b0c33f710d5e49c29a5a578521b6306bee28012aadde4a8
- ea83411bd7b6e5a7364f7b8b9018f0f17f7084aeb58a47736dd80c99cfeac7f1
- df176fb8cfbc7512c77673f862e73833641ebb0d43213492c168f99302dcd5e3
- d6a2a22000d68d79caeae482d8cf092c2d84d55dccee05e179a961c72f77b1ba
- ca3f6dce945ccad5a50ea01262b2d42171f893632fc5c5b8ce4499990e978e5b
- c7be8d1b8948e1cb095d46376ced64367718ed2d9270c2fc99c7052a9d1ffed7
- b74dbd02b7ebb51700f3c5900283e46570fe497f9b415d25a029623118073519
- bde6ef047e0880ac7ef02e56eb87d5bc39116e98ef97a5b1960e9a55cea5082b
- b699cd64b9895cdcc325d7dd96c9eca623d3ec0247d20f39323547132c8fa63b
- b3ad8409d82500e790e6599337abe4d6edf5bd4c6737f8357d19edd82c88b064
- afee245b6f999f6b9d0dd997436df5f2abfb3c8d2a8811ff57e3c21637207d62
- ac2df391ede03df27bcf238077d2dddcde24cd86f16202c5c51ecd31b7596a68
- aaa49b7b4f1e71623c42bc77bb7aa40534bcb7312da511b041799bf0e1a63ee7
- a06fd0b8936f5b2370db5f7ec933d53bd8a1bf5042cdc5c052390d1ecc7c0e07
- 9b161a32d89f9b19d40cd4c21d436c1daf208b5d159ffe1df7ad5fd1a57610e5
- 7f6912de8bef9ced5b9018401452278570b4264bb1e935292575f2c3a0616ec4
- 8349ba17f028b6a17aaa09cd17f1107409611a0734e06e6047ccc33e8ff669b0
- 803abfe19cdc6c0c41acfeb210a2361cab96d5926b2c43e5eb3b589a6ed189ad
- 7b29053306f194ca75021952f97f894d8eae6d2e1d02939df37b62d3845bfdb7
- 7ab36a93f009058e60c8a45b900c1c7ae38c96005a43a39e45be9dc7af9d6da8
- 7a815d4ca3771de8a71cde2bdacf951bf48ea5854eb0a2af5db7d13ad51c44ab
- 784c9711eadceb7fedf022b7d7f00cff7a75d05c18ff726e257602e3a3ccccc1
- 764a03bf28f9eec50a1bd994308e977a64201fbe5d41337bdcc942c74861bcd3
- 6e3ef9404817e168c974000205b27723bc93abd7fbf0581c16bb5d2e1c5c6e4a
- 59704cf55b9fa439d6f7a36821a50178e9d73ddc5407ff340460c054d7defc54
- 540c00e6c0b53332128b605b0d5e0926db0560a541bb13448d094764844763df
- 48a04c7c33a787ef72f1a61aec9fad87d6bd9c49542f52af7e029ac83475f45d
- 464e2f1faab2a40db44f118f7c3d1f9b300297fe6ced83fabe87563fc82efe95
- 4600703535e35b464f0198a1fa95e3668a0c956ab68ce7b719c28031d69b86ff
- 32e66b87f47245a892b102b7141d3845540b270c278e221f502807758a4e5dee
- 1ca1d5a53c4379c3015c74af2b18c1d9285ac1a48d515f9b7827e4f900a61bde
- 18c92006951f93a77df14eca6430f32389080838d97c9e47364bf82f6c21a907
- 10d7aedc963ea77302b967aad100d7dd90d95abcdb099c5a0a2df309c52c32b8
- 148f6b990fc1f1903287cd5c20276664b332dd3ba8d58f2bf8c26334c93c3af5
- 1007f5613a91a5d4170f28e24bfa704c8a63d95a2b4d033ff2bff7e2fe3dcffe
- 87.11.174.141
- 103.149.87.69
- 87.10.220.221
- 192.110.247.46
- 194.110.247.46
- 45.86.86.60
- www.codingdrunk.in
- http://pirati.abuser.eu/yakuza.yak.sh
- ru.coziest.lol
- pirati.abuser.eu
- f.codingdrunk.cc
- le.codingdrunk.in
- eighteen.pirate
Attack Patterns
- CAPSAICIN
- FICORA